,scramblesuit` in the managed use
case as well which I think is cute, if not massively useful.
As an added bonus it is a general solution that's more futureproof.
Regards,
--
Yawning Angel
signature.asc
Description: PGP signature
___
tor-dev mailing list
tor
started working on this, but if that's
the case I will update it as needed.
* pyptlib, done not merged. Waiting on #8402.
* obfsproxy, SOCKS4/5 done, not merged. HTTP CONNECT is a work in
progress, needs the pyptlib changes.
Regards,
--
Yawning Angel
From
so the pace should be less hectic.
Questions, comments, feedback appreciated as always,
--
Yawning Angel
signature.asc
Description: PGP signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman
9.1).
Thanks!
--
Yawning Angel
signature.asc
Description: PGP signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
release will close the difference further.
Hopefully it is of some use to people.
Special thanks to Fabian Keil for help testing and fixing the various
release candidates.
Questions, comments, feedback appreciated as always,
--
Yawning Angel
signature.asc
Description: PGP signature
the packet size/inter packet timing.
Assuming a basic familiarity with python (bonus points for Twisted),
this would be about an afternoon worth of code (if that), and from
there real development on different padding strategies could be
researched.
Regards,
--
Yawning Angel
signature.asc
.
--
Yawning Angel
signature.asc
Description: PGP signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
On Mon, 10 Mar 2014 01:57:11 +
Yawning Angel yawn...@schwanenlied.me wrote:
The moment the OpenVPN people fix their broken SOCKS client to not
offer to negotiate an authentication method that they can't actually
use due to missing parameters, this will work as expected.
https://github.com
appID
as a key for this (Eg: appid/tbbSessionID, timbSessionID,
etc). With prefixing the keys, the arg processing code for everything
needs to be appid aware (optional thing should be optional, and easy
to ignore).
Regards,
--
Yawning Angel
signature.asc
Description: PGP signature
in RFC1928, the server/client MUST drop the connection should be
sufficient? (I'm not sure either)
Regards,
--
Yawning Angel
signature.asc
Description: PGP signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https
connection
couldn't it?
One final open question, are there any other status codes that people
think should be defined beyond the HS ones and the PT ones?
Regards,
--
Yawning Angel
signature.asc
Description: PGP signature
___
tor-dev mailing list
tor-dev
).
Regards,
--
Yawning Angel
signature.asc
Description: PGP signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
On Thu, 06 Mar 2014 19:22:16 +0200
irregulator irregula...@riseup.net wrote:
On 03/05/2014 07:58 PM, Yawning Angel wrote:
Hey people thanks for your input,
I'm actually passing password inline while starting obfsproxy
(client-side) like that :
python pyobfsproxy.py --log-min-severity=info
1929 auth entirely by passing
--password Base32 encoded k_B as a command line option.
Regards,
--
Yawning Angel
[0]: https://github.com/Yawning/obfsproxy/tree/socks5-listener
signature.asc
Description: PGP signature
___
tor-dev mailing list
tor-dev
, comments, feedback appreciated!
--
Yawning Angel
signature.asc
Description: PGP signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
to contain
key/value pairs for extra flexibility in the future.
Questions, comments, feedback appreciated as always,
--
Yawning Angel
--- Begin proposal body ---
Filename: xxx-further-socks5-extensions.txt
Title: Further SOCKS5 extensions
Author: Yawning Angel
Created: 25-Feb-2014
Status: Draft
of relief from Fabian, I tested on
FreeBSD as well this time. The systems used for testing are in the
release notes.
Where: https://github.com/Yawning/obfsclient/releases/tag/v0.0.1-rc1
Thanks in advance,
--
Yawning Angel
signature.asc
Description: PGP signature
if the Session Ticket handshake fails,
and reopen the outgoing connection and try UniformDH, but I believe that
would require more code than send back a different response code and
let tor decide what to do.
Thanks,
--
Yawning Angel
signature.asc
Description: PGP signature
, and pushed a fix (7f123275d95ed8a95f15c0a75bd4e9ca241bee93).
On my 9.2-RELEASE vm, the tests and obfsclient binary run now, and I
made sure it still builds on the 10.0-RELEASE vm.
Regards,
--
Yawning Angel
signature.asc
Description: PGP signature
On Mon, 17 Feb 2014 19:34:36 +
Yawning Angel yawn...@schwanenlied.me wrote:
I will address the GCC build issues when I'm done working on that.
The system gcc on 9.1p10 is ancient (4.2.1), and does not support
C++11, so I would have to install gcc from ports.
I haven't installed gcc on my
in advance for the inconvenience, and thanks for the changes
and your patience.
--
Yawning Angel
diff --git a/src/schwanenlied/pt/obfs2/client.cc b/src/schwanenlied/pt/obfs2/client.cc
index 57daff4..0b567cc 100644
--- a/src/schwanenlied/pt/obfs2/client.cc
+++ b/src/schwanenlied/pt/obfs2/client.cc
On Fri, 14 Feb 2014 16:43:00 +0100
Fabian Keil freebsd-lis...@fabiankeil.de wrote:
Yawning Angel yawn...@schwanenlied.me wrote:
It's already fixed in 1e25c55ba54 without the patch.
Yay.
On a side note, tip of tree requires updating liballium since I
switched both of liballium
581bb2ac42be529b7bb5f8617a3c362ac38e47f9
commit 218c86b501f897a6c6b6e0bd14bde9ada5488b5d
commit 594caa7f36ae9f5a465324eda983b70c6289fcfb - master
Please let me know if it's still broken/if I've missed anything.
--
Yawning Angel
signature.asc
Description: PGP signature
___
tor-dev mailing
pain to the build process.
Thanks in advance,
--
Yawning Angel
signature.asc
Description: PGP signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
() form should be used when one or more of
the arguments is a 64-bit argument to ensure that argument
alignment is correct.
Regards,
--
Yawning Angel
signature.asc
Description: PGP signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https
on it).
The code is available at: https://github.com/Yawning/liballium
It still needs more documentation, but all of the use cases are covered
by a reasonably well commented example (examples/ptcfg_example.c).
Questions, comments, feedback all appreciated.
--
Yawning Angel
on windows. For
the U*IX targets, trickle does most of what we would want.
--
Yawning Angel
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
, feedback appreciated.
--
Yawning Angel
Lightweight Obfuscated Datagram Protocol (LODP)
Yawning Angel yawning at schwanenlied dot me
(XXX: Preliminary Draft. If anyone implements this, I will laugh at them,
because there are probably problems, and parts (all?) of it may suck. In
particular
201 - 228 of 228 matches
Mail list logo